1[1]H Bennett,G Brassard,A K Ekert.Quantum Cryptography[J]. Scientific American,1992,267(4):26-33.
2[2]J Blow,S J D Phoenix.On a fundamental theorem of quantum cry ptography[J].J.of Mod.Opt,1993,[ STHZ 40(1):33-36.
3[3]D Townsend,I Thompson.A quantum key distribution channel b ased on optical fibre[J].J.of Mod.Opt,1994,41(12):2425.
4[4]K Ekert.Quantum cryptography based on Bells theorem[J] .Phy.Rev.Lett,1991,67[ STBZ (6):661-663.
5[5]d Espagnat.The quantum theory and reality[J].Scientific American.1979,247(5 2):158-181.
6[6]H Bennett.Quantum cryptography using any two nonorthogonal s tates[J].Phy.Rev.Lett,1992,68(21):3121-3124.
7[7]M Barnett,B Hunttner,S J D Phoenix.Eavesdropping strategies and rejected-data protocols in quantum cryptography[J].J.of .Mod.Opt,1993,40(12):2 501-2513.
8[8]Goldenberg,Lev Vaidman.Quantum cryptography based on orthogo nal states[J].Phy.Rev.Lett,1995,[ STHZ 75(7):1239-1243.
9[9]D Townsend.Secure key distribution systems based on quantum cryptography[J].Electron.Lett,1994 ,30(10):809-811.
10[10]Marand,P D Townsend.Quantum key distribution over distance s as long as 30 km[J].Opt.Lett,1995,20(16):1695-1697.